By Topic

[1992] Conference Record of the Twenty-Sixth Asilomar Conference on Signals, Systems & Computers

26-28 Oct. 1992

Filter Results

Displaying Results 1 - 25 of 228
  • Analysis of DS/SSMA system with hard-limiting correlator over fading channels with impulsive noise

    Publication Year: 1992, Page(s):93 - 97 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB)

    The performance of a DS/SSMA (direct-sequence spread-spectrum multiaccess) system with hard-limiting correlation receivers is analyzed over nonselective Rician fading channels with impulsive noise. More specifically, computation of the average bit-error probabilities of the DS/SSMA system have been accomplished in this paper by exact computation for short spreading sequences and by approximation f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conference Record of The Twenty-Sixth Asilomar Conference on Signals, Systems and Computers (Cat. No.92CH3245-8)

    Publication Year: 1992
    Request permission for commercial reuse | PDF file iconPDF (20 KB)
    Freely Available from IEEE
  • Analysis of coefficient quantization noise in block digital filters

    Publication Year: 1992, Page(s):246 - 250 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    Coefficient quantization noise (CQN) in SVD block digital filters depends on the structure of their SISO filters. The problem of growing coefficient values in direct-form-derived block filters is analyzed. It is shown that normal form is free from this problem. Analysis of output CQN power shows different behavior from roundoff noise, in that it increases with block size. A new quantization method... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The generalized discrete W transform and its application to interpolation

    Publication Year: 1992, Page(s):241 - 245 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB)

    The generalized discrete W transform (GWT), which converts a length N+1 discrete signal to a length N sequence in the frequency domain, is defined, and its orthogonality is proved. The GWT can be computed via fast algorithms for the discrete W transform (DWT). Interpolation using the GWT is more accurate than interpolation schemes using other fast discrete sinusoidal transforms View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The PRISM 2.2 real time signal processing system

    Publication Year: 1992, Page(s):234 - 240 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    A description is given of the PRISM 2.2 system, a general purpose real-time signal processing system designed for very easy development and modification of signal processing applications. Both the hardware and software are flexible and easily modified to support changing project requirements. Use of additional hardware requires only an update of the configuration file. Signal processing block diag... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Estimation of simulation error due to trace inaccuracies

    Publication Year: 1992, Page(s):45 - 50 vol.1
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    The effect of trace inaccuracies on the evaluation of cache performance using trace driven simulation is examined. It is demonstrated that very inaccurate results are obtained when using a trace from which all operating system references have been removed. The notion of trace components is defined, providing a framework for quantifying the error in simulation results when portions of the complete ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelet transforms, wideband ambiguity functions and group theory

    Publication Year: 1992, Page(s):140 - 144 vol.1
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    Four forms of the wideband ambiguity function are unified by showing that they are connected to the affine group. Viewing the wideband ambiguity function as a wavelet transform, inversion of each form is then explored, using the various forms of the invariant measures of the affine group. Further questions for research are then considered View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Algorithm for EDAP-extracting data and plotting

    Publication Year: 1992, Page(s):229 - 233 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    EDAP (extracting data and plotting), an APL program driven by a REXX exec, is described. It runs in two modes. In a disconnected service machine environment, where, for example, three systems in one department use it to monitor the manufacturing lines and the semiconductor tools. In this mode, it runs unattended 24 hours a day seven days a week. It can also be used interactively. Given an arbitrar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correlation-based branch prediction

    Publication Year: 1992, Page(s):51 - 55 vol.1
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (460 KB)

    To enhance the accuracy of branch prediction, a correlation-based branch prediction scheme which takes into consideration the information provided by the outcomes of other branches as well is proposed. The scheme is examined using traces collected from running the SPEC benchmark suite on an IBM RISC System/6000 workstation. The results show that up to an addition of 11% prediction accuracy is achi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On optimal prefiltering for wavelet coefficient computation

    Publication Year: 1992, Page(s):135 - 139 vol.1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    The authors use an algorithm proposed by M.J. Shensa (1992) for computing the coefficients of the wavelet series transform (WST) or continuous wavelet transform (CWT) to filter a sampled discrete-time signal and then apply S. Mallat's (1989) discrete wavelet transform (DWT) algorithm to the filtered sequence. The prefiltering is used to reduce the approximation error between the computed and desir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Does this mathematica-based software package make teaching obsolete?

    Publication Year: 1992, Page(s):224 - 228 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    The SPP(Signal Processing Packages) software package, which is based on Mathematica, is discussed. SPP's capabilities are in continuous and discrete time. These capabilities include differential equations, convolution of a unity triangular pulse, Laplace transforms, Bode plots, pole-zero diagrams, Fourier transforms, root locus plots, difference equations, and z transforms View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer vision and sensor fusion for detecting buried objects

    Publication Year: 1992, Page(s):466 - 471 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    Given multiple images of the Earth's surface from dual-band infrared sensors, a system that fuses information from the sensors to reduce the effects of clutter and improve the ability to detect buried or surface target sites is presented. Supervised learning pattern classifiers (including neural networks) are used. Results of experiments to detect buried land mines from real data are given, and th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelets in optimal radar range-Doppler imaging

    Publication Year: 1992, Page(s):801 - 804 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    It is shown that the most accurate reconstruction of a range-Doppler target density that can be computed from N waveforms and their echoes is obtained by transmitting the singular functions corresponding to the N largest singular values of two kernels derived from the target density. The singular functions are valid wavelets that obey an additional orthogonality constraint in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A versatile parametric filter using an imbedded all-pass sub-filter to independently adjust bandwidth, center frequency, and boost or cut

    Publication Year: 1992, Page(s):269 - 273 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    The design of a versatile parametric digital filter is presented. Design equations are given to obtain specified cut/boost over a desired bandwidth. The definition of bandwidth for cut and boost filters is addressed, and the bandwidth options are described in terms of constant or variable 3-dB widths relative to cut/boost level View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Base station array receivers in cellular CDMA

    Publication Year: 1992, Page(s):646 - 650 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (436 KB)

    A code-division multiple-access (CDMA) scheme using an array receiver is considered. This array receiver is a natural generalization of matched filtering with time functions to matched spaced-time filtering. Computer simulations and mathematical analysis show that the improvement in output SINR per element is simply the increase in energy received by the array, when there are many more users than ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer architecture for commercial workloads

    Publication Year: 1992, Page(s):56 - 60 vol.1
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (476 KB)

    Various architectures for a database system are reviewed. First the database workload on a single processor is characterized and then several ways to construct parallel database systems are described. If the database contents are too large to fit in main memory, it is critical that the architecture offer a decent memory hierarchy. It is equally important for the database software to be aware of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The dyadic wavelet transform based QRS detector [ECG analysis]

    Publication Year: 1992, Page(s):130 - 134 vol.1
    Cited by:  Papers (9)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    A QRS complex detector for electrocardiogram (ECG) analysis based on the dyadic wavelet transform (DyWT) is described. It overcomes the problems associated with several QRS detectors; namely, they are insensitive to non-stationarities in the QRS complex and are not robust to noise. The performance of the detector is illustrated with representative examples, and its performance is compar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Maximum likelihood signal estimation using polarized arrays

    Publication Year: 1992, Page(s):219 - 223 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    The problem of separating and estimating the waveforms of superimposed signals received by a polarization sensitive antenna array is considered. Signal estimation is accomplished by a two-step maximum likelihood procedure: (i) the directions of arrival and polarization parameters of all the signals are estimated; (ii) the estimated signal is obtained as a linear combination of the array outputs, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On accurately tracking the harmonic components' parameters in voiced-speech segments and subsequent modeling by a transfer function

    Publication Year: 1992, Page(s):472 - 476 vol.1
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    An improved method for modeling voiced speech signals is proposed. First, a method to accurately model the signals using a linear combination of harmonically related sinewaves is described. The method fits a linear combination of sines and cosines whose frequencies are integer multiples of the unknown fundamental (pitch) frequency to the speech data in the least-square sense. The amplitudes of the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modulation models for image processing and wavelet-based image demodulation

    Publication Year: 1992, Page(s):805 - 810 vol.2
    Cited by:  Papers (13)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    AM-FM modulation models for two- and higher-dimensional complex-valued nonstationary signals and images that are locally coherent but globally wideband are studied. Demodulation techniques are studied for demodulating both one-component and multicomponent signals. For the case of multicomponent signals immersed in noise, the individual components must be isolated by spectrally localized multiband ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An efficient technique for compressing chain-coded line drawing images

    Publication Year: 1992, Page(s):717 - 720 vol.2
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (276 KB)

    An efficient technique for compressing chain-encoded line drawings is presented. The technique constructs a codebook containing vectors of chains which recur frequently in the chain-encoded line drawings. The recurrent vectors are encoded as their corresponding addresses in the codebook preceded by header bits. The encoding procedure and an efficient way to organize and label the vectors, which tu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A design approach for a decimation filter

    Publication Year: 1992, Page(s):274 - 277 vol.1
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    A basis for the design of a novel half band decimation filter is described. It is shown that by optimizing the decimation-filter design to the final performance specification rather than a stage-by-stage optimization, the performance goals can be achieved at lower cost, i.e., fewer computations per sample. The equations are derived and performance demonstrated against a typical specification View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On realistic and efficient scheduling of DSP algorithms onto multiprocessor architectures

    Publication Year: 1992, Page(s):651 - 655 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (388 KB)

    Available strategies for static scheduling of DSP algorithms onto multiprocessor (general purpose and DSP-based) systems are discussed. It is found that simplistic interprocessor communication (IPC) modeling and the absence of precedence analysis are major reasons for unrealistic and not always efficient solutions. The authors propose a mapping scheme based on clustering and various realistic sche... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An image processing resolution enhancement method for single-pixel targets

    Publication Year: 1992, Page(s):446 - 450 vol.1
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    A resolution enhancement technique for image processing systems is advantageous for applications limited to small sensor arrays or when relatively high resolution is required. The spatial quantization of image sensors causes a nonlinear input-output relationship which is a basic limitation. A new artificial means of perturbing the sensor array is presented that enhances resolution by smoothing the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cache-based solutions to hotspot contention in shared memory multiprocessors

    Publication Year: 1992, Page(s):61 - 65 vol.1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    A new cache-based approach for solving the tree saturation problem in multistage interconnection networks (MINs) is proposed. The scheme moves the hotspot from the main memory and distributes it in the MIN as cached copies. A stage of the MIN may have a cache copy of the hotspot and only hot requests can be routed to the cache. Due to the alternate paths taken by the hot requests the congestion at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.