By Topic

1996 IEEE International Conference on Acoustics, Speech, and Signal Processing Conference Proceedings

9-9 May 1996

Go

Filter Results

Displaying Results 1 - 25 of 139
  • Authors index

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (805 KB)
    Freely Available from IEEE
  • Real-time scheduling for pipelined execution of data flow graphs on a realistic multiprocessor architecture

    Publication Year: 1996, Page(s):3314 - 3317 vol. 6
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    Multimedia and digital signal processing applications have swiftly emerged as important areas for embedded computer systems. Therefore, it is imperative that computer architectures are devised that can cope with the increased burden of processing power implied by these applications. We present a heuristic static real-time scheduling method called real time data flow (RTDF), for mapping data flow g... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On retiming of multirate DSP algorithms

    Publication Year: 1996, Page(s):3310 - 3313 vol. 6
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    The retiming of DSP algorithms exhibiting multirate behavior is treated. Using the non-ordinary marked graph model and the reachability theory, we provide a new condition for valid retiming of multirate graphs. We show that for a graph with n nodes the reachability condition can be split into the reachability condition for the topologically-equivalent unit-rate graph (all rates set to one), and (n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An extension of multidimensional synchronous dataflow to handle arbitrary sampling lattices

    Publication Year: 1996, Page(s):3306 - 3309 vol. 6
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    Multidimensional synchronous dataflow (MDSDF) is a model of computation that has been proposed and implemented for specifying multidimensional multirate signal processing systems such as image and video processing algorithms. The model is an extension of synchronous dataflow (SDF) and has all of the desirable properties of the SDF model such as static schedulability, exposure of data and functiona... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RNIW: a novel general-purpose DSP architecture

    Publication Year: 1996, Page(s):3302 - 3305 vol. 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    High-sped advanced multimedia communication require greater parallelism in the traditional general-purpose DSP architecture. Some RISC architectures can provide enough processing capability comparable to the traditional general-purpose DSP architecture but are not adequate for new multimedia applications. While the very long instruction word (VLIW) architecture has been proved to be a very good ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An algorithm to determine hidden Markov model topology

    Publication Year: 1996, Page(s):3577 - 3580 vol. 6
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    Hidden Markov modeling (HMM) provides a probabilistic framework for modeling a time series of multivariate observations. An HMM describes the dynamic behavior of the observations in terms of movement among the states of a finite-state machine. We present an algorithm that selects an HMM topology for a set of time series data. Our method selects a topology based on a likelihood criterion and a heur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optoelectronic image processor for multiresolution Gabor filtering

    Publication Year: 1996, Page(s):3236 - 3239 vol. 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    An optoelectronic processor that should allow the implementation of multiresolution Gabor filtering at TV frame rates is described. The system takes the form of a TV camera with modified optics and some simple processing incorporated in the focal-plane detector array. The output of the camera is an array of images, each produced by putting the input image through an angularly-oriented Gabor-type s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An EM algorithm for multisensor TDOA/DD estimation in a multipath propagation environment

    Publication Year: 1996, Page(s):3117 - 3120 vol. 6
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    The problem of estimating time-difference-of-arrival (TDOA) and differential Doppler (DD) in a multipath environment is addressed. Correlated multipath interference has degenerative effects on the cross-ambiguity function which is the conventional joint TDOA/DD estimator. A new method, previously proposed for multisensor/multipath TDOA estimation, is extended to accommodate linearly-varying time d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient standard basis Reed-Solomon encoder

    Publication Year: 1996, Page(s):3287 - 3290 vol. 6
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    This paper presents an efficient Reed-Solomon encoder based on standard basis. The key operation in Reed-Solomon encoding is the multiplication of a feedback term with several (possibly) known terms. We present an efficient structure to implement this operation. The hardware complexity of this encoder is identical to the well-known Berlekamp encoder. It however, offers two advantages over the Berl... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gerschgorin radii based source number detection for closely spaced signals

    Publication Year: 1996, Page(s):3053 - 3056 vol. 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    We first analyze the resolution performance of the Gerschgorin radii based source number detector proposed by Wu, Yang and Chen (see IEEE Trans. SP, vol.43, no.6, p.1325-33, 1995) for independent closely-spaced plane waves. Based upon the analysis, we can easily verify the resolution threshold of the Gerschgorin radii based algorithm. For improvement of the detection performance, we then further p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Partial likelihood for real-time signal processing

    Publication Year: 1996, Page(s):3561 - 3564 vol. 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB)

    We introduce a unified statistical framework for real-time signal processing with neural networks by using a recent extension of maximum likelihood (ML) estimation, partial likelihood (PL) estimation theory, which allows for (i) dependent observations, and (ii) processing of data using only the information that is available at the time of processing. For a general neural network conditional distri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • HMM-based handwritten symbol recognition using on-line and off-line features

    Publication Year: 1996, Page(s):3438 - 3441 vol. 6
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    This paper addresses the problem of recognizing on-line sampled handwritten symbols. Within the proposed symbol recognition system based on hidden Markov models different kinds of feature extraction algorithms are used analysing on-line features as well as off-line features and combining the classification results. By conducting writer-dependent recognition experiments, it is demonstrated that the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The bootstrap applied to passive acoustic aircraft parameter estimation

    Publication Year: 1996, Page(s):3153 - 3156 vol. 6
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    This paper proposes and demonstrates a practical parameter estimation scheme for estimating the height, speed, range and acoustic frequency of an overflying aircraft. This scheme is based on the phase of the acoustic signal emitted by the aircraft as heard by a stationary observer. Bootstrap techniques are employed to determine confidence bounds for the aircraft parameters given only a single acou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time-area efficient multiplier-free recursive filter architectures for FPGA implementation

    Publication Year: 1996, Page(s):3268 - 3271 vol. 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB)

    Simultaneous design of multiplier-free recursive filters (IIR filters) and their hardware implementation in Xilinx field programmable gate array (XC4000) is presented. The hardware design methodology leads to high performance recursive filters with sampling frequencies in the interval 15-21 MHz (17 bits internal data representation). It is demonstrated that the time-area efficiency and performance... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New perspectives for maximum-likelihood parameter and time delay estimation using two channels

    Publication Year: 1996, Page(s):3129 - 3132 vol. 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    This paper introduces a new realization for maximum likelihood parameter and time-delay estimation using two channels. We obtain the result by using coupled Karhunen-Loeve expansions to derive the likelihood function. The new realization illuminates the analytical relationship between maximum likelihood time-delay estimation and other methods. Experimental results that support the theoretical find... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Granularly-pipelined CORDIC processors for sine and cosine generators

    Publication Year: 1996, Page(s):3298 - 3301 vol. 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    The CORDIC algorithm is a powerful tool for computing trigonometric functions (sine and cosine) and some transcendental functions (hyperbolic sine and cosine) at a circuit complexity suited for physical implementation by using VLSI technologies. In this paper, we propose a family of architectures for high-throughput applications based on computation pipelining. The granularity of pipelining can be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of a neural network detector vs Neyman-Pearson optimal detector

    Publication Year: 1996, Page(s):3573 - 3576 vol. 6
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB)

    We optimize a neural network applied to binary detection such as those found in radar or sonar. Topics about designing the structure, training procedure and evaluating the performance, are discussed. The detector optimization is based on the use of a criterion function that yields a solution significantly superior to the typical sum-of-square-error. Using a modeled input, its performance is evalua... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic target recognition using modularly cascaded vector quantizers and multilayer perceptrons

    Publication Year: 1996, Page(s):3386 - 3389 vol. 6
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    An automatic target recognition classifier is constructed of a set of vector quantizers (VQs) and multilayer perceptrons (MLPs) that are modularly cascaded. A dedicated VQ codebook is constructed for each target at a specific range of aspects. Each codebook is a set of block feature templates that are iteratively adapted to represent a particular target at a specific range of aspects. These templa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Telekom's MAGENTA algorithm for en-/decryption in the Gigabit/sec range

    Publication Year: 1996, Page(s):3233 - 3235 vol. 6
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    The Deutsche Telekom is currently considering the development of an en-/decryption module for widespread (internal) usage. For this purpose a block-cipher algorithm has been developed by the Deutsche Telekom. The algorithm named MAGENTA which stands for Multifunctional Algorithm for General-purpose Encryption and Network Telecommunication Applications, is based on the shuffle signal-flow structure... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A minimax optimization approach to sidelobe suppression filter design

    Publication Year: 1996, Page(s):3113 - 3116 vol. 6
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB)

    A sidelobe suppression filter is designed to operate simultaneously with a matched filter. For the purpose of the design, a filter is canonically decomposed into two orthogonal components. One is the conventional matched filter, the other is the sidelobe suppression filter. The minimax optimization technique is utilized to determine the optimal filter weights to minimize the peak sidelobe level of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probabilistic mapping networks for speaker recognition

    Publication Year: 1996, Page(s):3374 - 3377 vol. 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    The expectation-maximization (EM) algorithm is a general technique for maximum likelihood estimation (MLE). In this paper, we present two important theoretical issues concerning Gaussian mixture modeling (GMM) within the EM framework. First, we propose an EM algorithm for estimating the parameters of a GMM structure dedicated to speaker recognition, the probabilistic mapping network (PMN), where t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Handwritten word recognition using dynamic matching with variable duration

    Publication Year: 1996, Page(s):3454 - 3457 vol. 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    A fast matching algorithm using dynamic programming for handwritten word recognition is presented. The variable duration for each character is defined based on the character segmentation statistics obtained during the training phase. The variable duration represents the possible ways in which a character image can be split into segments. Experimental results prove that our approach using the varia... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new survivor memory management method in Viterbi decoders: trace-delete method and its implementation

    Publication Year: 1996, Page(s):3284 - 3286 vol. 6
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    The well known methods for survivor path storage and decoding are the register-exchange method (REM) and the trace-back method (TBM). The REM is conceptually simple, but it is not appropriate for VLSI implementation because it requires large power consumption and large chip area. The TBM is the preferred method in the VLSI implementation of Viterbi decoders (VD) having large constraint length and ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Feature extraction and sufficient statistics in detection and classification

    Publication Year: 1996, Page(s):3049 - 3052 vol. 6
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (364 KB)

    The effectiveness of sufficient statistics as features in the detection/classification process is studied. The concept of a sufficient statistic is reviewed and an empirical method of developing an `apparent' sufficient statistic from training data is offered. Examples of the performance enhancement achieved when using such statistics on real world data in both linear and neural network classifier... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-organizing feature maps with perfect organization

    Publication Year: 1996, Page(s):3557 - 3560 vol. 6
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    The self-organizing feature maps (SOFMs) introduced by Kohonen (1990) have found use in a wide variety of signal processing applications. The goal of SOFMs is to allow encoding of high-dimensional data vectors in such a manner that a vector's relative position in the codebook is related to the information in the vector in as simple a fashion as possible. One measure of the SOFM's performance in ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.