By Topic

Computer as a Tool, 2005. EUROCON 2005.The International Conference on

Date 21-24 Nov. 2005

Go

Filter Results

Displaying Results 1 - 25 of 272
  • [Cover]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (406 KB)  
    Freely Available from IEEE
  • EUROCON 2005 - The International Conference on 'Computer as a Tool'

    Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (165 KB)  
    Freely Available from IEEE
  • Copyright page

    Page(s): ii
    Save to Project icon | Request Permissions | PDF file iconPDF (157 KB)  
    Freely Available from IEEE
  • Message from the Technical Program and General Chairs

    Page(s): iii - iv
    Save to Project icon | Request Permissions | PDF file iconPDF (214 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Conference committee

    Page(s): v - vii
    Save to Project icon | Request Permissions | PDF file iconPDF (279 KB)  
    Freely Available from IEEE
  • Conference support staff

    Page(s): viii
    Save to Project icon | Request Permissions | PDF file iconPDF (212 KB)  
    Freely Available from IEEE
  • List of reviewers

    Page(s): ix - x
    Save to Project icon | Request Permissions | PDF file iconPDF (191 KB)  
    Freely Available from IEEE
  • Contents

    Page(s): xi - xl
    Save to Project icon | Request Permissions | PDF file iconPDF (197 KB)  
    Freely Available from IEEE
  • [Breaker page]

    Page(s): 889
    Save to Project icon | Request Permissions | PDF file iconPDF (64 KB)  
    Freely Available from IEEE
  • All-MOS Non-floating One-Port Linear Resistors for Spatio-Temporal Retinotopic Processing

    Page(s): 890 - 893
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2520 KB) |  | HTML iconHTML  

    The voltage mirroring technique implemented with MOS transistors that exhibits performance of nonfloating linear resistive element is presented. It comprises only three MOS transistors: two of them are enhancement type and the third is depletion type MOS transistor. The possibilities of controlling the variable resistance (tunability) are presented and simulation results are given. One substantial implementation of the circuit in all-MOS linear resistive grid for spatial retinotopic processing is outlined View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Linear Active Resistor Based on CMOS Square-Root Circuits for VLSI Applications

    Page(s): 894 - 897
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1676 KB) |  | HTML iconHTML  

    The main advantages of the new proposed CMOS active resistor are the improved linearity, the small area consumption and the improved frequency response. An original technique for linearizing the I(V) characteristic of the active resistor is proposed, based on the utilization of a new linear differential amplifier and on a current-pass circuit. The linearization of the original differential structure is achieved by compensating the quadratic characteristic of the MOS transistor operating in the saturation region by original square-root circuits. The errors introduced by the second-order effects is estimated, while the frequency response of the circuit is very good as a result of biasing all MOS transistors in the saturation region and of the current-mode operation of the square-root circuits. The active resistor is implemented in 0.35mum CMOS technology, the SPICE simulation confirming the theoretical estimated results and showing a linearity error under a percent for an extended input range (plusmn400mV)and a small value of the supply voltage (plusmn2.5V) View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A 10-Bit 500Ms/s Two-Step Flash ADC

    Page(s): 898 - 901
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3341 KB) |  | HTML iconHTML  

    In this article, a novel 10-bit two-step flash A/D converter architecture based on the threshold inverter quantization technique, TIQ is presented. The simulation results include 1.5V analog input range, 30 MHz input bandwidth, and 250 mWatts of power consumption at maximum sampling rate of 500 Ms/s. The process parameter and temperature variation analysis of the converter is especially included. The DC simulation results show linearity measures of less than 0.1 LSB DNL and INL for each 5-bit flash core. The active chip area is 1.4mm2 in 0.5mum CMOS technology View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of Microcontrollers in Education Based on Mobile Platform

    Page(s): 902 - 905
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1915 KB) |  | HTML iconHTML  

    The article describes a concept of the evaluation board based on a simple single chip microcontroller (mainly Atmel AT89C51CC03). It was developed especially for teaching purposes. The concept consists of main board and supplementary modules. This contributes to the flexibility of the whole system. We try to make labs more efficient and attractive. The mobile platform has been involved into a semestral project. Students are able to experiment with new types of sensors and new algorithms View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Increased Autonomous Behaviour in Embedded Devices with Micro-controller Integration

    Page(s): 906 - 909
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2345 KB) |  | HTML iconHTML  

    Microcontrollers in dedicated systems were mainly limited to server solutions that provided a semiautomated control of a system. As the 20th century rolled to an end, systems became increasingly complex; integrating different technologies. At the same time, microprocessors became more and more a commodity tool instead of a component in an expensive machine. In this paper, we describe the impact of microprocessor integration at several levels of a novel heterogeneous commercial display system, not only lowering the cost of production, but also exponentially increasing the functionality and fault tolerance of these systems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specific Analog Electronic Circuits Analysis Using PC-based Acquisition Card

    Page(s): 910 - 913
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2369 KB) |  | HTML iconHTML  

    Computer integrated laboratory for analogue electronics was developed. This paper presents analysis of specific linear electronic circuits, such as differential amplifier, oscillator, operational amplifier, power amplifier, full-wave rectifier and stabilizer with series transistor. All analysis are performed using virtual instruments implemented using personal computer acquisition card and LABVIEW development software View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Control Method for Single-Phase Shunt Active Power Filter

    Page(s): 914 - 917
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3146 KB) |  | HTML iconHTML  

    The paper contains a description of control method for single-phase shunt active power filter, based on the control with DSP TMS320LF2407 for reference signal estimation, and hysteresis current control. Filter, based on half-bridged schematic and control by the proposed method, is simulated and experimentally studied View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Breaker page]

    Page(s): 918
    Save to Project icon | Request Permissions | PDF file iconPDF (64 KB)  
    Freely Available from IEEE
  • Image Compression Using Complex Wavelet Transform

    Page(s): 919 - 922
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2691 KB) |  | HTML iconHTML  

    Discrete wavelet transform (DWT) became a powerful method for signal processing in the last decade. One of the most important applications of this tool is compression, for the bi-dimensional signals JPEG 2000 being an example. Although the new standard offers better results than the old one, new innovating ideas can improve even the JPEG 2000. One idea is to use complex wavelet transforms, transforms that offers more directions, instead of classical DWT. This paper comes to show the superiority of complex wavelet transforms in image compression, testing a new transform developed by N.G. Kingsbury. For this, the embedded zero-tree wavelet (EZW) algorithm proposed by Shapiro was used to compress images at some different bit rates View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-Pass Hexagonal Algorithm with Parallel Implementation for Video Coding

    Page(s): 923 - 926
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2798 KB) |  | HTML iconHTML  

    This paper presents a paralleled two-pass hexagonal (TPA) algorithm constituted by linear hashtable motion estimation algorithm (LHMEA) and hexagonal search (HEXBS) for motion estimation. In the TPA, motion vectors (MV) are generated from the first-pass LHMEA and are used as predictors for second-pass HEXBS motion estimation, which only searches a small number of macroblocks (MBs). We introduced hashtable into video processing and completed parallel implementation. We propose and evaluate parallel implementations of the LHMEA of TPA on clusters of workstations for real time video compression. It discusses how parallel video coding on load balanced multiprocessor systems can help, especially on motion estimation. The effect of load balancing for improved performance is discussed. The performance of the algorithm is evaluated by using standard video sequences and the results are compared to current algorithms View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iterative Algorithm for Restoring Wavelet-Based Compressed Images

    Page(s): 927 - 930
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2259 KB) |  | HTML iconHTML  

    In this paper we propose an iterative algorithm, based on modeling of the degradation system, for reducing coding distortions in wavelet-based compressed images. The proposed algorithm iteratively reconstructs the degraded image. In every step of the iteration, image enhancement processes are implemented dependent of the image content. The performance of the proposed algorithm is evaluated experimentally View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality of Chest X-ray Images Compressed Using JPEG and JPEG

    Page(s): 931 - 934
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2505 KB) |  | HTML iconHTML  

    The aim of this paper is to compare the quality of digitized chest X-ray images with digitally captured chest X-ray images in children with lung tuberculosis (TB), compressed using popular JPEG and JPEG2000 compression algorithms, for further electronic correspondence. All images were compressed using JPEG and JPEG2000 compression algorithms with six different compression degrees (3 bpp, 1.5 bpp, 1 bpp, 0.7 bpp, 0.5 bpp, 0.3 bpp). Picture quality was evaluated by means of usual objective measures of picture quality such as MSE, SNR and PSNR. All compressed images were shown to physicians, who were asked to evaluate diagnostic accuracy of each image (by poor, good or excellent). According to physician's subjective evaluation both JPEG and JPEG2000 compression for all X-ray digitized images (all TB-attributes) were accepted as excellent View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison Criteria for Optimum Image Compression

    Page(s): 935 - 938
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2633 KB) |  | HTML iconHTML  

    Recently, many efficient image compression methods have been developed in order to compress image data prior to further processing. Discrete cosine transforms and wavelet transforms are examples of these compression methods. The aim of the work presented within this paper is to introduce comparison criteria for optimum compression using these well known image compression techniques. The comparison criteria will comprise visual inspection and computed analysis View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Twin Image Watermarking Algorithm (TIWA): A New Techniques for Single and Multi-Message Watermarking Based on Optimum Complete Complementary Codes

    Page(s): 939 - 942
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4117 KB) |  | HTML iconHTML  

    In this paper, a new robust image watermarking technique adopting an optimum encoding framework is proposed. This technique namely, the twin image watermarking algorithm TIWA, utilizes a particular kind of optimum two dimensional codes, based on complete complementary codes, for the introduced watermark encoding process. The TIWA algorithm is first presented for single user, then supported with the optimum code arrays properties, is developed to support multi-message hiding. The enhanced robustness, the developed security, and the remarkable performance compared to conventional technique are the main advantages of the proposed technique shown by the simulation results View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image Watermarking Based on the Discrete Wavelet Transform Statistical Characteristics

    Page(s): 943 - 946
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1661 KB) |  | HTML iconHTML  

    The current paper proposes a robust watermarking method for still images that embeds a binary watermark into the detail subbands of the image wavelet transform. The perceptually significant coefficients are selected for each subband using a different threshold. The threshold is computed based on the statistical analysis of the wavelet coefficients. For greater invisibility of the mark, the approximation subband is left unmodified. The watermark is embedded several times to achieve robustness. The method is tested against different types of attacks (lossy compression, AWGN, scaling, cropping, intensity adjustment, filtering and collusion attack). The proposed method was compared with a state-of-the-art watermarking method, highlighting its performances View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Watermark Generation using Image-dependent Key for Image Authentication

    Page(s): 947 - 950
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (390 KB) |  | HTML iconHTML  

    In order to increase security of the blind watermarking schemes for image authentication it is desirable to use image-dependent keys in the process of watermark generation. In this paper we propose a new watermarking method for image authentication where the watermark is generated using the image hash as a key. The robust image hash, invariant to legitimate modifications, but fragile to illegitimate modifications is generated from the local image characteristics. Due to this relation between the watermark and the image hash, it is possible to differentiate among legitimate and illegitimate modifications of the image. Quantized index modulation of DCT coefficients is used for watermark embedding. Watermark detection is performed without use of the original image. Experimental results demonstrate the effectiveness of the proposed method in terms of robustness and fragility View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.